b

South Africa Rolls Out Biometric Passports




b

DotNetNuke CMS 9.5.0 File Extension Check Bypass

DotNetNuke CMS version 9.5.0 suffers from file extension check bypass vulnerability that allows for arbitrary file upload.




b

WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass

WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability.




b

Magento WooCommerce CardGate Payment Gateway 2.0.30 Bypass

Magento WooCommerce CardGate Payment Gateway version 2.0.30 suffers from a payment process bypass vulnerability.




b

TP-Link TL-WR849N 0.9.1 4.16 Authentication Bypass

TP-Link TL-WR849N version 0.9.1 4.16 suffers from a firmware upload authentication bypass vulnerability.




b

Intelbras Wireless N 150Mbps WRN240 Authentication Bypass

Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability.




b

Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass

Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability.




b

Ivanti Workspace Manager Security Bypass

Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability.




b

Oce Colorwave 500 CSRF / XSS / Authentication Bypass

Oce Colorwave 500 printer suffers from authentication bypass, cross site request forgery, and cross site scripting vulnerabilities.




b

CyberArk PSMP 10.9.1 Policy Restriction Bypass

CyberArk PSMP versions 10.9.1 and below suffer from a policy restriction bypass vulnerability.




b

HP ThinPro 6.x / 7.x Filter Bypass

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from an application filter bypass vulnerability.




b

SITS:Vision 9.7.0 Authentication Bypass

An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected.




b

Huawei HG630 2 Router Authentication Bypass

Huawei HG630 2 Router suffers from an authentication bypass vulnerability.




b

QRadar Community Edition 7.3.1.6 Authorization Bypass

QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability.




b

Online Scheduling System 1.0 Authentication Bypass

Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability.




b

File Explorer 1.4 Access Bypass

File Explorer for iOS version 1.4 suffers from an access bypass vulnerability.




b

ManageEngine DataSecurity Plus Authentication Bypass

ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffer from an authentication bypass vulnerability.




b

Nissan Car Secretly Shares Driver Data With Websites




b

Ubuntu Security Notice USN-4171-5

Ubuntu Security Notice 4171-5 - USN-4171-1 fixed vulnerabilities in Apport. This caused a regression in autopkgtest and python2 compatibility. This update fixes the problem. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled lock-file creation. This could be used by a local attacker to cause a denial of service against Apport. Kevin Backhouse discovered Apport read various process-specific files with elevated privileges during crash dump generation. This could could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Various other issues were also addressed.




b

Mandos Encrypted File System Unattended Reboot Utility 1.8.10

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.




b

Ubuntu Security Notice USN-4312-1

Ubuntu Security Notice 4312-1 - Matthias Gerstner discovered that Timeshift did not securely create temporary files. An attacker could exploit a race condition in Timeshift and potentially execute arbitrary commands as root.




b

Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution

This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root.




b

Netis E1+ 1.2.32533 Hardcoded Backdoor Account

Netis E1+ version 1.2.32533 suffers from having a hardcoded backdoor root account.




b

TrixBox CE 2.8.0.4 Command Execution

This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap.




b

IBM Data Risk Manager 2.0.3 Default Password

This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.






b

Multiple Vulnerabilities in MySQL - Upgrade Now





b

netABuse Insufficient Windows Authentication Logic Scanner

netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.




b

Spectre Chip Security Vulnerability Strikes Again





b

WebAssembly Changes Could Ruin Meltdown And Spectre Patches




b

007 Code Helps Stop Spectre Exploits Before They Exist




b

New Spectre Attack Enables Secrets To Be Leaked Over A Network





b

Intel Fixes Severe NUC Firmware, Web Console Vulnerabilities




b

Intel CMSE Bug Is Worse Than Previously Thought




b

Intel Fixes High-Severity Flaws In NUC, Discontinues Buggy Compute Module